Vulnerabilities (CVE)

Filtered by vendor Testlink Subscribe
Filtered by product Testlink
Total 25 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2012-0938 1 Testlink 1 Testlink 2025-04-12 6.5 MEDIUM N/A
Multiple SQL injection vulnerabilities in TestLink 1.9.3, 1.8.5b, and earlier allow remote authenticated users with certain permissions to execute arbitrary SQL commands via the root_node parameter in the display_children function to (1) getrequirementnodes.php or (2) gettprojectnodes.php in lib/ajax/; the (3) cfield_id parameter in an edit action to lib/cfields/cfieldsEdit.php; the (4) id parameter in an edit action or (5) plan_id parameter in a create action to lib/plan/planMilestonesEdit.php; or the req_spec_id parameter to (6) reqImport.php or (7) in a create action to reqEdit.php in lib/requirements/. NOTE: some of these details are obtained from third party information.
CVE-2014-8081 1 Testlink 1 Testlink 2025-04-12 7.5 HIGH N/A
lib/execute/execSetResults.php in TestLink before 1.9.13 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the filter_result_result parameter.
CVE-2014-5308 1 Testlink 1 Testlink 2025-04-12 9.0 HIGH N/A
Multiple SQL injection vulnerabilities in TestLink 1.9.11 allow remote authenticated users to execute arbitrary SQL commands via the (1) name parameter in a Search action to lib/project/projectView.php or (2) id parameter to lib/events/eventinfo.php.
CVE-2014-8082 1 Testlink 1 Testlink 2025-04-12 5.0 MEDIUM N/A
lib/functions/database.class.php in TestLink before 1.9.13 allows remote attackers to obtain sensitive information via unspecified vectors, which reveals the installation path in an error message.
CVE-2012-0939 1 Testlink 1 Testlink 2025-04-12 6.5 MEDIUM N/A
Multiple SQL injection vulnerabilities in TestLink 1.8.5b and earlier allow remote authenticated users with the Requirement view permission to execute arbitrary SQL commands via the req_spec_id parameter to (1) reqSpecAnalyse.php, (2) reqSpecPrint.php, or (3) reqSpecView.php in requirements/. NOTE: some of these details are obtained from third party information.
CVE-2007-6006 1 Testlink 1 Testlink 2025-04-09 10.0 HIGH N/A
TestLink before 1.7.1 does not enforce an unspecified authorization mechanism, which has unknown impact and attack vectors.
CVE-2023-50110 1 Testlink 1 Testlink 2024-11-21 N/A 7.5 HIGH
TestLink through 1.9.20 allows type juggling for authentication bypass because === is not used.
CVE-2022-35196 1 Testlink 1 Testlink 2024-11-21 N/A 8.8 HIGH
TestLink v1.9.20 was discovered to contain a Cross-Site Request Forgery (CSRF) via /lib/plan/planView.php.
CVE-2022-35195 1 Testlink 1 Testlink 2024-11-21 N/A 7.2 HIGH
TestLink 1.9.20 Raijin was discovered to contain a broken access control vulnerability at /lib/attachments/attachmentdownload.php
CVE-2022-35193 1 Testlink 1 Testlink 2024-11-21 N/A 7.2 HIGH
TestLink v1.9.20 was discovered to contain a SQL injection vulnerability via /lib/execute/execNavigator.php.
CVE-2020-8841 1 Testlink 1 Testlink 2024-11-21 6.5 MEDIUM 8.8 HIGH
An issue was discovered in TestLink 1.9.19. The relation_type parameter of the lib/requirements/reqSearch.php endpoint is vulnerable to authenticated SQL Injection.
CVE-2020-8639 1 Testlink 1 Testlink 2024-11-21 6.5 MEDIUM 8.8 HIGH
An unrestricted file upload vulnerability in keywordsImport.php in TestLink 1.9.20 allows remote attackers to execute arbitrary code by uploading a file with an executable extension. This allows an authenticated attacker to upload a malicious file (containing PHP code to execute operating system commands) to a publicly accessible directory of the application.
CVE-2020-8638 1 Testlink 1 Testlink 2024-11-21 7.5 HIGH 9.8 CRITICAL
A SQL injection vulnerability in TestLink 1.9.20 allows attackers to execute arbitrary SQL commands in planUrgency.php via the urgency parameter.
CVE-2020-8637 1 Testlink 1 Testlink 2024-11-21 7.5 HIGH 9.8 CRITICAL
A SQL injection vulnerability in TestLink 1.9.20 allows attackers to execute arbitrary SQL commands in dragdroptreenodes.php via the node_id parameter.
CVE-2020-12274 1 Testlink 1 Testlink 2024-11-21 7.5 HIGH 9.8 CRITICAL
In TestLink 1.9.20, the lib/cfields/cfieldsExport.php goback_url parameter causes a security risk because it depends on client input and is not constrained to lib/cfields/cfieldsView.php at the web site associated with the session.
CVE-2020-12273 1 Testlink 1 Testlink 2024-11-21 5.0 MEDIUM 7.5 HIGH
In TestLink 1.9.20, a crafted login.php viewer parameter exposes cleartext credentials.
CVE-2019-20381 1 Testlink 1 Testlink 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
TestLink before 1.9.20 allows XSS via non-lowercase javascript: in the index.php reqURI parameter. NOTE: this issue exists because of an incomplete fix for CVE-2019-19491.
CVE-2019-20107 1 Testlink 1 Testlink 2024-11-21 6.5 MEDIUM 8.8 HIGH
Multiple SQL injection vulnerabilities in TestLink through 1.9.19 allows remote authenticated users to execute arbitrary SQL commands via the (1) tproject_id parameter to keywordsView.php; the (2) req_spec_id parameter to reqSpecCompareRevisions.php; the (3) requirement_id parameter to reqCompareVersions.php; the (4) build_id parameter to planUpdateTC.php; the (5) tplan_id parameter to newest_tcversions.php; the (6) tplan_id parameter to tcCreatedPerUserGUI.php; the (7) tcase_id parameter to tcAssign2Tplan.php; or the (8) testcase_id parameter to tcCompareVersions.php. Authentication is often easy to achieve: a guest account, that can execute this attack, can be created by anyone in the default configuration.
CVE-2019-19491 1 Testlink 1 Testlink 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
TestLink 1.9.19 has XSS via the lib/testcases/archiveData.php edit parameter, the index.php reqURI parameter, or the URI in a lib/testcases/tcEdit.php?doAction=doDeleteStep request.
CVE-2019-14471 1 Testlink 1 Testlink 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
TestLink 1.9.19 has XSS via the error.php message parameter.